Skip to main content

and
  1. No Access

    Article

    The gap between intractable problem and adaptive chosen ciphertext security

    To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 secu...

    **an-hui Lu 路献辉, Xue-jia Lai 来学嘉 in Journal of Shanghai Jiaotong University (S… (2009)

  2. No Access

    Article

    Identity-based encryption with non-interactive opening

    An identity-based encryption (IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system. Two kinds of ...

    Jia Fan 范 佳, **ao-hu Tang 唐小虎, Li Kang 康 立 in Journal of Shanghai Jiaotong University (S… (2008)